Skip to main content
Log in

Relay selection schemes for secure transmission in cognitive radio networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The security in cognitive radio networks (CRNs) has been attracting continuously growing attention due to the open and dynamic nature of cognitive radio architecture. In this paper, we propose new relay selection schemes to improve the physical layer security in CRNs. A trusted decode-and-forward relay is selected to help the secondary user (SU) transmission and improve the secrecy rate in the presence of multiple eavesdroppers and multiple primary users (PUs). The secrecy rate of the SU is characterized under both its own transmit power constraint as well as a set of interference power constraints imposed at each PU, in order to preserve its quality of service. The performance of the proposed schemes is analyzed in terms of the achievable secrecy rate and the intercept probability. Closed form expressions for the asymptotic intercept probability at high source-relays channel variances are also derived. Moreover, new derivations of some existing traditional schemes are presented and compared. The performance comparison of the proposed schemes with the schemes proposed in the literature reveals the superior of the proposed schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. It should be noted that in [9] and [10] all relays are assumed to decode correctly , and the derived expressions of the intercept probability are considered exact . Our case is more general as we consider \(|{\mathcal{D}}| = N\) an asymptotic case. So, the derived expressions are considered asymptotic according to this assumption.

References

  1. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Computer Networks, 50(13), 2127–2159.

    Article  MATH  Google Scholar 

  2. Biglieri, E., Goldsmith, A. J., Greenstein, L. J., Mandayam, N. B., & Poor, H. V. (2013) Principles of cognitive radio. Cambridge: Cambridge University Press.

  3. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656–715.

    Article  MathSciNet  MATH  Google Scholar 

  4. Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.

    Article  MathSciNet  MATH  Google Scholar 

  5. Barros, J., & Rodrigues, M. R. D. (2006, July). Secrecy capacity of wireless channels. In Proceedings of IEEE international symposium information theory (pp. 356–360).

  6. Li, Z., Trappe, W., & Yates, R. (2007, March). Secret communication via multi-antenna transmission. In Proceedings of 41st conference on information sciences systems, Baltimore, MD.

  7. Khisti, A., Womell, G., Wiesel, A., & Eldar, Y. (2007, June). On the Gaussian MIMO wiretap channel. In Proceedings of IEEE international symposium on information theory, Nice, France.

  8. Oggier, F., & Hassibi, B. (2007). The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory, 57(8), 4961–4972.

    Article  MathSciNet  MATH  Google Scholar 

  9. Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 2099–2111.

    Article  Google Scholar 

  10. Zou, Y., Wang, X., & Shen, W. (2013, June). Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack. In Proceedings of IEEE international conference on communicaitons (ICC 2013) (pp. 1–5).

  11. Al-nahari, A., Krikidis, I., Ibrahim, A. S., Dessouky, M. I., & El-Samie, F. A. (2012). Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers. Transactions on Emerging Telecommunications Technologies (ETT), 25(4), 445–460.

    Article  Google Scholar 

  12. Shu, Z., Qian, Y., & Ci, S. (2013). On physical layer security for cognitive radio networks. IEEE Networks, 27(3), 28–32.

    Article  Google Scholar 

  13. Leon, O., Serrano, J. H., & Soriano, M. (2010). Securing cognitive radio networks. International Journal of Communications Systems, 23(5), 633–652.

    Google Scholar 

  14. El-Hajj, W., Safa, H., & Guizani, M. (2011). Survey of security issues in cognitive radio networks. Journal of Internet Technology, 12(2), 25–37.

    Google Scholar 

  15. Anand, S., & Chandramouli, R. (2008, May). On the secrecy capacity of fading cognitive wireless networks. In Proceedings IEEE CrownCom.

  16. Pei, Y., Liang, Y., Zhang, L., Teh, K. C., & Li, K. H. (2010). Secure communication over MISO cognitive radio channels. IEEE Transactions on Wireless Communications, 9(4), 1494–1592.

    Article  Google Scholar 

  17. Zou, Y., Wang, X., & Shen, W. (2013). Physical layer security with multiuser scheduling in cognitive radio networks. In IEEE Transactions on Communications, 61(12), 5103–5113.

  18. Sakran, H., Nasr, O., Shokair, M., El-Rabaie, E., & El-Azm, A. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6(16), 2676–2687.

    Article  MathSciNet  Google Scholar 

  19. Al-Jamali, M., Al-nahari, A., & Al-Khawlani, M. (2015). Relay selection scheme for improving the physical layer security in cognitive radio networks. In Proceedings of 23rd IEEE signal processing and communications applications, Malatya, 16–19 May 2015.

  20. Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.

    Article  Google Scholar 

  21. Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 1787–1791.

    Article  Google Scholar 

  22. Miller, S., & Childers, D. (2004). Probability and random processes with applications to signal processing and communications. San Diego: Elsevier Academic Press.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azzam Al-nahari.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-jamali, M., Al-nahari, A. & AlKhawlani, M. Relay selection schemes for secure transmission in cognitive radio networks. Wireless Netw 24, 911–923 (2018). https://doi.org/10.1007/s11276-016-1378-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1378-9

Keywords

Navigation